Static task
static1
Behavioral task
behavioral1
Sample
09ada66e1d71ea184f7b86acc9648a0dc2c8d4ed99d0290a69e5a7796688bf58.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
09ada66e1d71ea184f7b86acc9648a0dc2c8d4ed99d0290a69e5a7796688bf58.exe
Resource
win10v2004-20240709-en
General
-
Target
09ada66e1d71ea184f7b86acc9648a0dc2c8d4ed99d0290a69e5a7796688bf58
-
Size
1.1MB
-
MD5
2ae46a969ed32a2b248c8cc6069ca559
-
SHA1
82690a8a6546dad841f201c24a7b500734c575c7
-
SHA256
09ada66e1d71ea184f7b86acc9648a0dc2c8d4ed99d0290a69e5a7796688bf58
-
SHA512
9c8fe4ff4e3b729dee7afabd2ef6e96c3806b2522c58013a21152deead4c8185210b8926daab37a9eb0567acbf9310f2506b207cb918971eb7a98c8768b88b3b
-
SSDEEP
12288:UF45ozbfhWvLP3g1nYCZtKkKiuAZEoqyQbm:L0mcnYCrKBiqhm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09ada66e1d71ea184f7b86acc9648a0dc2c8d4ed99d0290a69e5a7796688bf58
Files
-
09ada66e1d71ea184f7b86acc9648a0dc2c8d4ed99d0290a69e5a7796688bf58.exe windows:4 windows x64 arch:x64
4c438d3a9d35ede17cc8b6edfd26f7c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
AdjustTokenPrivileges
GetUserNameW
ImpersonateLoggedOnUser
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RevertToSelf
comctl32
CreateStatusWindowW
ImageList_Create
ImageList_Remove
ImageList_ReplaceIcon
InitCommonControls
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
ExcludeClipRect
ExtTextOutW
LineTo
MoveToEx
RestoreDC
SaveDC
SelectObject
SetBkColor
SetPixel
SetTextColor
kernel32
CloseHandle
CreateEventW
CreateProcessW
CreateThread
EnterCriticalSection
FormatMessageW
GetCommandLineA
GetModuleHandleA
GetModuleHandleW
GetPriorityClass
GetProcAddress
GetProcessAffinityMask
GetProcessIoCounters
GetStartupInfoA
GetSystemInfo
GetVersionExW
HeapAlloc
HeapFree
InitializeCriticalSection
IsWow64Process
LeaveCriticalSection
LocalFree
MultiByteToWideChar
OpenProcess
ReadProcessMemory
ResetEvent
SetEvent
SetPriorityClass
SetProcessAffinityMask
TerminateProcess
WaitForSingleObject
WriteProcessMemory
lstrcmpW
ntdll
NtQueryInformationProcess
NtQuerySystemInformation
shell32
ShellAboutW
Shell_NotifyIconW
shlwapi
StrFormatByteSizeW
StrFormatKBSizeW
ucrtbase
__acrt_iob_func
__p___argc
__p___argv
__stdio_common_vfprintf
__stdio_common_vswprintf
_configure_narrow_argv
_get_initial_narrow_environment
_initialize_narrow_environment
_set_app_type
_ui64tow
exit
log10
memcpy
strcmp
toupper
wcscat
wcsstr
user32
AppendMenuW
BeginPaint
BringWindowToTop
CallWindowProcW
CascadeWindows
CheckMenuItem
CheckMenuRadioItem
CopyRect
CreateDialogParamW
CreateIconIndirect
CreatePopupMenu
DefWindowProcW
DeleteMenu
DestroyIcon
DestroyMenu
DialogBoxParamW
DrawMenuBar
DrawTextW
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumWindows
FillRect
GetClassLongPtrW
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetGuiResources
GetMenu
GetMenuItemCount
GetMenuState
GetParent
GetSubMenu
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongPtrW
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
InsertMenuW
InvalidateRect
IsHungAppWindow
IsIconic
IsWindow
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapW
LoadIconW
LoadImageA
LoadImageW
LoadMenuW
LoadStringA
LoadStringW
MapWindowPoints
MessageBoxW
MoveWindow
OpenIcon
PostMessageW
ReleaseDC
RemoveMenu
SendMessageA
SendMessageTimeoutW
SendMessageW
SetFocus
SetForegroundWindow
SetMenuDefaultItem
SetTimer
SetWindowLongPtrW
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SwitchToThisWindow
TileWindows
TrackPopupMenu
TrackPopupMenuEx
WinHelpW
wsprintfW
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 612KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/4 Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/92 Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ